Chianxin's endogenous security framework: the guarantee in the digital age needs endogenous security.
The new generation enterprise network security framework (endogenous security framework) launched by Chianxin won the leading scientific and technological achievements of the world Internet in 2020.
"The arrival of the digital age has completely broken the boundaries between the online world and the physical world and brought new security risks. The previous static border protection idea has not adapted to the needs of the new era, and the protection in the digital age requires endogenous security. " At the conference of leading scientific and technological achievements, Qi Xiangdong, chairman of Qi Anxin Group, introduced that endogenous security refers to the built-in and self-generated security capability in the information environment. Through "one center, five filters", the ubiquitous network security "immunity" is established from five levels of network, data, application, behavior and identity, thus greatly reducing the risk of network attacks and truly ensuring business security.
In the leading achievement release activity, Qi Xiangdong demonstrated the network security defense model: through the demonstration video, it can be clearly and vividly seen that in the face of network attacks, the new generation of enterprise network security framework (endogenous security framework) limits the cross-regional network lateral mobile attack path through measures such as deep network access protection, and continuously eliminates external risks and asset exposure; In the same area, combined with active protection and passive trapping technology, we can find and clear the internal strongholds of intruders, repair loopholes and defects, and ensure the security of internal networks. Finally, combined with external security information and big data analysis, rapid security response and disposal are implemented to block threats from the government and enterprises.
Qi Xiangdong said that the new generation of enterprise network security framework (endogenous security framework) not only established a "pre-prevention" security system for the government and enterprises, but also made network security gradually move from the periphery to the core, from plug-ins to endogenous, from "compliance" to "actual combat", and promoted the development of network security to infrastructure and service models.
"The' Ten Major Projects and Five Major Tasks' of network security planning in the digital age are applicable to almost all application scenarios, and can guide different industries to export network security architectures that meet their own characteristics, build a dynamic and comprehensive network security defense system, and fully meet the security needs of the digital age." Qi Xiangdong said.
It is understood that the related components of Chianxin's new generation enterprise network security framework (endogenous security framework) have obtained more than 1000 invention patents and computer software copyrights in the field of network security, and another 850 invention patent applications are under review.
At the previous main forum, Qi Xiangdong said that network security is the backboard of digital technology. Without network security, the role of digital technology will be greatly reduced. "The wooden barrel with short boards can't hold enough water, but the hole in the bottom plate of the barrel can't hold water. It is necessary to be good at making up the short board and pay attention to strengthening the bottom board. " Qi Xiangdong believes that in the digital age, building a network security backplane depends on a data-driven endogenous security framework.
Tencent Conference Practice: Becoming the First Award-winning Video Conference Product
Since this year, the outbreak of the epidemic has caught everyone off guard. The suspension of business, schools and trade has had a great impact on all aspects of China's economic and social life. Tencent Conference has built a borderless communication bridge at home and abroad by creating multi-party audio and video collaboration capabilities, which demonstrates the power of "science and technology for good".
It is reported that after the outbreak of the epidemic, Tencent meeting was urgently deployed, and the capacity of 300 meetings was quickly opened, and it was rapidly expanded in the first time. In eight days, Tencent expanded its capacity by more than 6,543.8+10,000 cloud hosts, invested more than one million core computing resources, and completed service coverage in more than 654.38+ 000 countries and regions around the world. This has set an unprecedented record in the history of cloud computing in China, reflecting the China speed of scientific and technological products, and further ensuring the interaction and economic development of all walks of life, including government, enterprises and schools, in terms of anti-epidemic experience and trade.
Behind the speed, there is more technology. In order to support large-scale online collaboration, Tencent's conference solution includes many powerful basic technologies developed by Tencent, including TDSQL, a high-performance, financial-grade and highly available distributed database technology independently developed for more than ten years. Based on the support of TDSQL, Tencent Conference stably supports the usage demand of more than 1 100 million users, and provides users with high-speed, smooth, stable and reliable services and experiences at any time without fear of sudden traffic increase and failure disaster.
According to the report "Social Value and Future Development of Internet Conference" released by Peking University Internet Development Research Center, during June-May this year, Tencent Conference directly saved 71400 million yuan in social cost, which brought great social value and contribution to many aspects including science and technology, culture and economy.
Alibaba Cloud Shenlong Architecture: the representative of the third generation virtualization technology in cloud computing industry.
Yesterday, Alibaba Cloud's self-developed Shenlong Cloud server architecture was selected as the world's leading Internet technology achievement. Simply put, Shenlong has solved the problem of virtualization performance loss that has plagued the cloud computing industry for many years, making the server play a higher performance and be more stable.
According to the evaluation of the conference, Shenlong Architecture is a typical representative of the third generation virtualization technology in the cloud computing industry. It was born for the cloud, which not only solved the pain point of virtualization performance loss on the cloud, but also made the performance of the cloud server surpass the physical machine. Today's Shenlong architecture carries more than 80% of China's high-tech enterprises to the cloud, and is widely used in many industries, such as medical care, new government affairs, intelligent manufacturing, Internet, education and so on.
Jiang, a partner of Alibaba and the head of Alibaba Cloud's basic products, said when receiving the award: "Shenlong is one of the key innovative technologies in Alibaba Cloud, which can accelerate the inclusiveness of cloud computing." It is reported that Alibaba Cloud's self-developed Shenlong architecture can integrate the high performance of the physical machine with the flexibility of the virtual machine by transferring virtualization to special hardware for acceleration, with almost zero virtualization loss, stronger performance than the traditional physical machine, and capacity expansion at any time, greatly reducing the cost of customers.
360 holographic star map network space mapping system: illuminating the "dark forest" of cyberspace
The 360 Holographic Star Map Cyberspace Mapping System, which won the title of "Leading Scientific and Technological Achievements of the Global Internet", is a cloud application of 360 security infrastructure, and illuminates the "dark forest" of cyberspace by transforming data into real comprehensive perception.
Pan Jianfeng, chief scientist of 360, said that at the technical level, the 360 holographic star map network space mapping system has raised the capabilities of network space detection, data analysis and map drawing to a new height. Combining the self-developed Vscan detection engine and 360 security big data, the local perspective can be transformed into a global perspective, which is helpful to transform passive response into active monitoring and active early warning.
At the application level, the 360 holographic star mapping system has accumulated billions of data in the whole network. Relying on the knowledge base and the overall ability of the security expert team, it can help multi-terminal users of the party, government, military and enterprises to realize active detection and early warning of cyberspace risks, support network security situation awareness, trace back the sources of advanced threats, and continuously update global security risks.
At the same time, under the empowerment and command of the 360 new generation network security capability system, the 360 holographic star map network space mapping system can also establish a continuous operation and cooperative combat mechanism with other security infrastructures of the whole system, such as intelligence cloud, vulnerability cloud, killing cloud and analysis cloud, so as to create a systematic security protection force for joint defense and control.